AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 a...AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 and November 2008, patients with recurrent hepatitis C virus (HCV) after LT were selected for treatment if liver biopsy showed at least grade 2 inflammation and/or stage 2 flibrosis. All patients were to receive pegylated interferon (PEG)/regimens combining ribavirin (RBV) for an additional 48 wk after HCV undetectability.RESULTS: Extended protocol treatment was initiated in thirty patients. Overall, 73% had end of treatmentresponse and 60% had SVR. Nineteen patients completed treatment per protocol, of them, sixteen (84%) had end of treatment response, and fourteen (74%) achieved SVR. Both early virological response and 24-week virological response were individually associated with SVR but this association was not signif icant on multivariate analysis. Eleven patients (37%) discontinued therapy due to adverse effects. Cytopenias were the most common and most severe adverse effect, and required frquent growth factor use, dose adjustments and treatment cessations. The risk of rejection was not increased.CONCLUSION: Recurrent HCV after LT can be safely treated with extended virological responseguided therpy using PEG/RBV, but requires close monitoring for treatment-related adverse effects, particularly cytopenias.展开更多
Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Att...Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 "An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps", Nonlinear Dynamics 77(7): 399-411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.'s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server's public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications.展开更多
This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, system...This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.展开更多
文摘AIM: To evaluate the efflicacy and tolerability of an extended treatment protocol and to determine the predictors of sustained virological response (SVR) after liver transplantation (LT).METHODS: Between August 2005 and November 2008, patients with recurrent hepatitis C virus (HCV) after LT were selected for treatment if liver biopsy showed at least grade 2 inflammation and/or stage 2 flibrosis. All patients were to receive pegylated interferon (PEG)/regimens combining ribavirin (RBV) for an additional 48 wk after HCV undetectability.RESULTS: Extended protocol treatment was initiated in thirty patients. Overall, 73% had end of treatmentresponse and 60% had SVR. Nineteen patients completed treatment per protocol, of them, sixteen (84%) had end of treatment response, and fourteen (74%) achieved SVR. Both early virological response and 24-week virological response were individually associated with SVR but this association was not signif icant on multivariate analysis. Eleven patients (37%) discontinued therapy due to adverse effects. Cytopenias were the most common and most severe adverse effect, and required frquent growth factor use, dose adjustments and treatment cessations. The risk of rejection was not increased.CONCLUSION: Recurrent HCV after LT can be safely treated with extended virological responseguided therpy using PEG/RBV, but requires close monitoring for treatment-related adverse effects, particularly cytopenias.
基金Project supported by the National Natural Science Foundation of China(Grant No.61462033)
文摘Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 "An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps", Nonlinear Dynamics 77(7): 399-411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.'s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server's public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications.
文摘This paper presents a secure communication protocol model-EABM, by which network security communication can be realized easily and efficiently. First, the paper gives a thorough analysis of the protocol system, systematic construction and state transition of EABM. Then , it describes the channels and the process of state transition of EABM in terms of ESTELLE. At last, it offers a verification of the accuracy of the EABM model.